BUSINESS > Services > IT & Telecoms


« Back to News

2015-03-05

Google Cloud offers security scanning for customer apps

Google Cloud Security Scanner, now available as a free beta for Google App Engine users..

2015-03-02

New weapons offer hope against advanced cyber-attacks

One of the most frightening things about modern cyber-attacks is that a breach can remain undetected within networks for weeks or longer.

2015-03-02

You’ve been hacked. Now what?

What should a company do after it’s been hacked? Six key steps.

2015-03-03

Kasperky Identify The ‘Equation Group’

Kaspersky Lab has uncovered an advanced hacking group, allegedly within the US National Security Agency...

2015-03-06

Who Owns Your Big Data?

One of the key questions for big data is who owns the data...

2015-01-28

Plans to Conquer: Chinese Internet Giant Tencent Targets Silicon Valley

Tencent is the Chinese Internet giant to rival Silicon Valley's titans and is not far behind Amazon, Google, eBay and Facebook.

2015-01-29

New institute to train cyber security talent

An institute for training network and information-security talent has been established at Xidian University in Xi'an, Shaanxi province, to bolster national security.

2015-01-29

Macro-based malware is making a comeback

For the past several months, different groups of attackers have distributed malware through Microsoft Office documents that contain malicious macros, reviving a technique that has been out of style for more than a decade.

2015-02-05

UK: New £3m cyber innovation centre in Gloucester

A new cyber innovation unit will open in Gloucester this week. Raytheon will officially launch the new unit, which has been set up to help protect computer networks from cyber attacks.

2015-02-05

Hacking Paranoia: Switzerland Cashing In By Marketing Itself As A 'Safe Haven' For Storing Data

Switzerland, facing an erosion of the banking secrecy laws that helped make it the world's banker, is now touting its reputation as a safe and stable haven to become a global data vault.

2015-02-05

Apple iOS Backdoor: Snowden says iPhone is a Government Spy

Infamous former NSA contractor Edward Snowden thinks that Apple's iPhone has "unique computer software" that authorities can activate remotely to be in a position to gather information about the user.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Wehowsky.com

Wehowsky.com

We specialize in developing innovative solutions to detect cyber threats in near real time by looking for suspicious anomalies in computer networks.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.